Transcripts For DW DocFilm - Cybercrime - The Business Of Fe

DW DocFilm - Cybercrime - The Business Of Fear August 10, 2018 05:15:00

Computers can be used as weapons more and more people have become victims of cyber crime. Because it was an absolute disaster you just dont do things like that to people. I knew generation of criminals is making money over the internet a lot of money. Just one month you have one hundred orders and the next one thousand. Private Sector Companies Infrastructure Systems and government institutions have all been hacked. Will be hit hard. By brute force and. You know its. Fear of such attacks has created a multibillion Dollar Industry but what do we know about these Cyber Security companies. Been ripped off by cyber scammers. Men often from african countries for your phone Vulnerable Women they use fake photographs and other materials to pass themselves off as attractive singles from europe they use digital messages and phone calls to try to get their victims to hand over money in this case the crooks even used shes bank account to deposit funds theyd stolen from others thats what got her into trouble with the police. She even thought about killing herself. Martin about it is a psychologist and Cyber Crime Profiler based in Oxford University shes been doing research on why people continue to fall for these kinds of scams. They have finally found someone. They can develop a relationship with someone they can trust the offender of for a month will be very good at building that kind of trust so the victims actually even if they identify that this is a scam they will never not necessarily lose their trust in. The financial losses are often compounded by Emotional Distress it may be easy for some to british cule those who Transfer Thousands of euros from their bank account to a perfect stranger but cyber crime and spying no means confined to men and women who are simply looking for companionship criminals also target businesses. Take the norm back based firm leoni for instance in august twenty sixth seen as a scam cost the company forty Million Euros a Senior Executive at one of the Firms Subsidiaries in romania transfer the money after she got an email from someone claiming to be one of the companys top german executives. Human factor is the weakest link however we see that cyber crime or crime online is becoming more sophisticated more organized criminals use Techniques Social Engineering techniques in order to persuade people to open up an email or provide information. So i think that blaming users is really not going to solve the problem. What are these Social Engineering Techniques and why do they work so well. A computer is only as secure as the person who operates it social engineers take advantage of this situation for example they sometimes portray themselves as i. T. Support staff and offer to help solve targeted attacks known as advanced persistent threats or a p. T. S. Are becoming more sophisticated and more common. Alpha very is convinced that every German Company is a potential target. You were now in a period of transition where people are willing to discuss these problems open lines with his. Company experts are exchanging detailed information on various kinds of attacks and how they can protect themselves against those injuries and to provide an effective defense we have to have the latest information on the attackers and their methods form the vic some. Part of the process includes a Detailed Analysis of previous attacks because many Hacking Operations follow a pattern. These patterns include brute force attacks in which hackers try to crack a Computer Users Password they simply track through vast quantities of Character Combinations until they find the right one thats why experts advise people to use passwords that are as complex as possible. Another method involves using a digital bomb to automatically infect computers that are using Outdated Software some kinds of worms contain mall where that locks up the computer and orders the user to pay money to unlock it this sort of malware is known as ransomware. Its nothing short of digital Blackmail Experts Advice Computer Users to keep their Antivirus Software up. To date to prevent such attacks. A monetary gain financial gain political already just beliefs so people want to make a statement against government against the country there could be actually emotional reactions. Or even sexual impulses showing off my skills to my peers. One person who made a name for himself by demonstrating his Hacking Skills was an Iraqi Born British student mustafa. In twenty eleven he and several members of a group known as Lulz Security broke into the Computer Systems of several High Profile Companies and organizations but they didnt do it for money they did it to show that they knew more about Digital Security than a lot of highly paid specialists. They also wanted some corporations to become more transparent about their activities. A group of technologically savvy young people could break into just about any website they wanted. Some says they wanted to demonstrate that a lot of companies dont pay enough attention to cybersecurity. Most common misconception about cybercrime is that its complicated or its like its easy. To do it anyone can. Do hacking. Theres many. Schools freely available. To do you have people out more and more about how these attacks works and a lot of the peers were in general. A lot of the fear and misconception uncertainty around here. Because we would use. Who was just sixteen at the time it was arrested and pleaded guilty to charges of computer. Or misuse he was given a suspended sentence of twenty months in jail today hes working on a Doctorate Degree in Computer Security. And. The threat posed by cyber criminals is complex they have a wide variety of motives and methods and one of the german off already is doing to crack down on them. Where in the german state of has a at the Central Office for fighting cyber crime. Public prosecutors really are and. Are working hard to get a grip on the situation. And we deal with a wide variety of digital crime just as police do in real life for example Child Pornography or the sale of weapons on the dot net. These are crimes that you wouldnt necessarily need a computer for but today that taking place on a dark night from yet but has. The dark net is an unregulated and mostly anonymous part of the internet. Such a flood was one of the first germans to sell Illegal Drugs on a platform known as Silk Road Flom sold cocaine and ecstasy and didnt worry much about getting caught. It was for all of you for the good it was to was like a gold rush. You felt like the cops would never find you. We simply werent on your thirtys radar like cept maybe americans decided. To figure out what was going on pretty early but the germans didnt mind switches until may twenty thirty no self secured as it was enough to get. The silk road became a road to riches had customers from All Over The World and he provided them with high quality drugs. In fact he was one of the most popular dealers on the site as indicated by customer ratings. Profits from drug deals made flom wealthy he could now afford luxury cars and caribbean vacation its. Good for you or did some economics for a living so i was fairly close to the sources the board trades and direct reports of sort upwards i was pretty much the only person between the producers and the consumers. And for both of them we dont give them it its a consequence i bypassed the whole Distribution Chain as if of course i sold stuff by the gram but hundreds of grams a day just the same just this could only have happened on the internets responsible for at least otherwise youd have to deal with all sorts of middlemen but i was able to sell directly to my customers just a little pissed someone for over so bring on this were able to skim even through some to notify him or. But the author already said were already closing in flambe had become careless he made deliveries in person to some clients one of them was working undercover for the police flom was arrested and later sentenced to seven years in prison. Believes that its much more difficult these days for criminals to operate on the dark net his unit has managed to shut down a major Child Pornography ring and to identify the seller of a weapon that was used in a mass shooting in munich in Twenty Sixteen. But office says that its usually Good Old Fashioned Police Work that bring cyber criminals to justice. And if i didnt boot this young woman its simply not true that we investigators hacking into a Computer Systems i want to make that absolutely clear. That the technical options that we have been investigating a dark night crime are straightforward. We dont hack into systems and we dont hunt around there for suspects. We use traditional investigative methods including undercover operations for these patrols between. Their communications and dont deliver their products in person make it difficult for investigators to track them down but perhaps an ever greater cause for concern is the fact that Digital Technology can be used as a weapon in acts of sabotage terrorism. In twenty ten Security Experts discovered that a malicious Computer Worm called stuxnet had infected several hundred thousand computers Around The World most of them in iran. The worm interfered with the operations of centrifuges in the Natanz Enrichment Plant in iran one thousand centrifuges were affected fifteen to thirty percent of irans Enrichment Capacity most experts suspect that the u. S. Was behind the attack although some say it may also have been israel. In december twenty fifth teen Western Ukraine was hit by a Power Failure Hundreds of thousands of people were affected in what turned out to be the First Successful Hacker Attack on a power grid the attackers managed to break into the grids Network System and then just before christmas they disconnected several substations the result blackout. Russia was widely believed to have organized the attack. Twenty seventeen ransomware crypto one spread around the. Targeted windows Computer Systems that were still using outdated security protection users had to pay money to unblocked their. Computers europe and the u. K. Were hard hit hospitals and Automobile Factories were forced to shut down the National German rail system was also affected total damage estimates range from several hundred Million Euros to about four billion but those responsible for the attacks didnt make a lot of money from their blackmail efforts only about One Hundred Thirty Thousand dollars. In march twenty eighth the German Government was hit by a powerful cyber attack. The attack targeted a number of german ministries. And since this story broke yesterday Everyone Wants to know whether any data was stolen. German investigators quickly identified the perpetrators as an elite group of Russian Hackers known as snake. They managed to operate under attack to it for months in the governments administrative system. The threat posed by such attacks is very real. Digital Technology Experts in israel know this all too well their country is surrounded by enemies including the state of iran jihadist groups in the Palestinian Territories and hezbollah in Southern Lebanon on. Israelis must not only live with the danger of military attacks but also cyber attacks. Journalist and author Ronen Bergman says that israel was the first country to recognize that in todays interconnected world the internet not only provides the benefit of improved communication but can also be a threat to National Security thats why israel has developed a sophisticated side. The Security System that includes the Military Business and research groups. Israel is under at least the sense. Of constant war constant threat a Liberal Democracy In The Middle East that faces extreme threats and therefore use the extreme measures to counter that this is not the mindset in other countries and when this is the mindset that drives people to the edge can do a lot inventing a lot in being very innovative in order to counter the threats and this is also the basis of israeli success in so. Many israeli students are preparing for a career in unit a two hundred b. Agency thats responsible for Code Decryption and collecting signals intelligence its an option that for many is preferable to doing their mandatory Military Service in for example the occupied territories. A two hundred. Military intelligence m b in the Intelligence Community all the mother and father start of nation there wouldnt be. Such a hyphen in grown Fertile Ground for the growing of these huge huge arendelle start ups and acknowledge investment and break through without the existence of israeli intelligence. The city of beersheba located in the negev desert is one of israels key high tech centers. The advanced technologies park located on the outskirts of the city was founded in twenty thirteen and has been expanding ever since. The park is a magnet for israeli Computer Experts and their colleagues from Around The World. Five thousand personnel from unit eight two hundred are due to move to beersheba soon plus even more private sector computer Security Experts. The idea is to create a huge cybersecurity complex that will prepare israel for the future. Its a joint project that will combine the efforts of the Israeli Military plus the science and business communities. Is the director of the Cyber Security Research Center at Ben Gurion University l. Of it says that this synergistic approach will help israel to defend itself against cyber attacks. We are less than the eve about what can be done. Because we do what. Is there or others is cyber act tools to do and eventually or the cup ability of the state frances eventually are leaking to the cyber crime so we have an advantage that we know in advance what is so broken those are going to use that to you its. Private sector businesses are also interested in these developments thats why elevates created Telecom Innovation laboratories a Joint Venture between Ben Gurion University and Torture Telecom and European Companies know that they can benefit from israeli technology. Many companies from europe are coming to us will try to buy new technologies into the minnesota security maybe from start up companies or lifted several technologies from Different Companies and they are using them either to protect to sell it to other Companies Inside germany and in europe. Germany is now adopting some of the innovations developed by the israeli side. Military complex even though in the past Cooperation Among the military educational institutions and the private sector has b

© 2025 Vimarsana